Abstract

As a standard digital signature may be verified by anybody, it is unsuitable for personal or economically sensitive applications. The chameleon signature system was presented by Krawczyk and Rabin as a solution to this problem. It is based on a hash then sign model. The chameleon hash function enables the trapdoor information holder to compute a message digest collision. The holder of a chameleon signature is the recipient of a chameleon signature. He could compute collision on the hash value using the trapdoor information. This keeps the recipient from disclosing his conviction to a third party and ensures the privacy of the signature. The majority of the extant chameleon signature methods are built on the computationally infeasible number theory problems, like integer factorization and discrete log. Unfortunately, the construction of quantum computers would be rendered insecure to those schemes. This creates a solid requirement for construct chameleon signatures for the quantum world. Hence, this paper proposes a novel quantum secure chameleon signature scheme based on hash functions. As a hash-based cryptosystem is an essential candidate of a post-quantum cryptosystem, the proposed hash-based chameleon signature scheme would be a promising alternative to the number of theoretic-based methods. Furthermore, the proposed method is key exposure-free and satisfies the security requirements such as semantic security, non-transferability, and unforgeability.

Highlights

  • A Hash-Based Quantum-Resistant Chameleon Signature SchemeAnbazhagan 2 , Woong Cho 3 , Gyanendra Prasad Joshi 4 and Eunmok Yang 5,*

  • An ordinary digital signature is not suitable for all applications that are personally or commercially sensitive

  • Ateniese & de Medeiros in [4] identified that the problem of key exposure on forgeries threatened the claim of non-transferability and provided a solution to the problem through an identity-based chameleon hash function

Read more

Summary

A Hash-Based Quantum-Resistant Chameleon Signature Scheme

Anbazhagan 2 , Woong Cho 3 , Gyanendra Prasad Joshi 4 and Eunmok Yang 5,*

Introduction
Related Work
Chameleon Signature Schemes
Security Requirements of Chameleon Signature Schemes
Construction of a Chameleon Hash Scheme
Construction of the Chameleon Signature Scheme
Security Analysis of the Proposed Hash-Based Chameleon Signature Scheme
Discussion
Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call